Our Blog

Read our latest blog posts

Kaseya VSA Supply Chain Ransomware Incident

On 02 July 2021, Kaseya disclosed that they were the victim of a large-scale ransomware attack. Here...

Continue reading

XVigil’s Fake Domain Finder: A Deep-dive on the Acquisition Component and...

Here's how XVigil's Fake Domain Finder framework uses the Acquisition component and crawlers to identify fake domains...

Continue reading

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

The Future of Web Tracking

Google is moving towards a privacy-focused approach with regards to web tracking, by rewriting conventional ad tracking...

Continue reading

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

Intelligent Searching Techniques in Artificial Intelligence

This blog breaks down various search techniques of Intelligent Agents when faced with complex problems in Artificial...

Continue reading

Design Thinking Through the Lenses of Innovation

Design Thinking, a human-centered process, solves even the most complex problems for innovative companies like Infosys, PepsiCo,...

Continue reading

Cloud Container Attack Tool (CCAT) and Cryptojacking

The deficiency of container security tools is a major concern among developers. Find out how you can...

Continue reading

Three Quick Wins to Address in an Active Directory Environment

The popularity of Active Directory makes it a juicy target for cyber extortion. Here are some quick...

Continue reading

7 Tips to Optimize Website Performance and Improve Page Load Speed

Page load speed, as a part of website performance, determines the first impression of your online users....

Continue reading